Presentation | 2014-03-27 On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers Yuka ENOMOTO, Akira KANAOKA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions. Recent Windows (7, 8, 8.1) has a possibility to be impersonated by third party (potentially malicious host) as a printer. Thus, Man-In-The-Middle attack may also caused at default setting of Windows. In this paper, flows of discovery and configuration of network printers are investigated by both of specification and real traffic data, then shows the risk of impersonation and MITH attacks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Network Printer / Impersonation / Man-In-The-Middle Attack / Windows |
Paper # | ICSS2013-68 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2014/3/20(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers |
Sub Title (in English) | |
Keyword(1) | Network Printer |
Keyword(2) | Impersonation |
Keyword(3) | Man-In-The-Middle Attack |
Keyword(4) | Windows |
1st Author's Name | Yuka ENOMOTO |
1st Author's Affiliation | Faculty of Science, Toho University() |
2nd Author's Name | Akira KANAOKA |
2nd Author's Affiliation | Faculty of Science, Toho University |
Date | 2014-03-27 |
Paper # | ICSS2013-68 |
Volume (vol) | vol.113 |
Number (no) | 502 |
Page | pp.pp.- |
#Pages | 5 |
Date of Issue |